Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
loligang.arm6.elf

Overview

General Information

Sample name:loligang.arm6.elf
Analysis ID:1583065
MD5:113b69a75fef3c05400f2bb238517c71
SHA1:44f89b451160b5cd00ec0dea58d797fc909b539e
SHA256:48e34c5e31fc5a124a250fdf311177dacaaaaed7dc516b062976a7d4d8b7d2e5
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai
Score:80
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Executes the "systemctl" command used for controlling the systemd system and service manager
Reads system version information
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1583065
Start date and time:2025-01-01 18:04:16 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 6s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:loligang.arm6.elf
Detection:MAL
Classification:mal80.troj.linELF@0/0@2/0
Command:/tmp/loligang.arm6.elf
PID:5734
Exit Code:139
Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
Killed:False
Standard Output:

Standard Error:qemu: uncaught target signal 11 (Segmentation fault) - core dumped
  • system is lnxubuntu20
  • loligang.arm6.elf (PID: 5734, Parent: 5543, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/loligang.arm6.elf
  • systemd New Fork (PID: 5809, Parent: 1)
  • snap-failure (PID: 5809, Parent: 1, MD5: 69136a7d575731ce62349f2e4d3e5c36) Arguments: /usr/lib/snapd/snap-failure snapd
    • systemctl (PID: 5826, Parent: 5809, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl stop snapd.socket
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
loligang.arm6.elfJoeSecurity_Mirai_9Yara detected MiraiJoe Security
    loligang.arm6.elfJoeSecurity_Mirai_5Yara detected MiraiJoe Security
      loligang.arm6.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x144a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x144b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x144c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x144dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x144f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x14504:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x14518:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1452c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x14540:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x14554:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x14568:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1457c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x14590:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x145a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x145b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x145cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x145e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x145f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x14608:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1461c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x14630:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      loligang.arm6.elfMirai_Botnet_MalwareDetects Mirai Botnet MalwareFlorian Roth
      • 0x1434c:$x1: POST /cdn-cgi/
      • 0x15854:$s1: LCOGQGPTGP
      loligang.arm6.elfMAL_ELF_LNX_Mirai_Oct10_2Detects ELF malware Mirai relatedFlorian Roth
      • 0x1434c:$c01: 50 4F 53 54 20 2F 63 64 6E 2D 63 67 69 2F 00 00 20 48 54 54 50 2F 31 2E 31 0D 0A 55 73 65 72 2D 41 67 65 6E 74 3A 20 00 0D 0A 48 6F 73 74 3A
      SourceRuleDescriptionAuthorStrings
      5734.1.00007f5c8c017000.00007f5c8c02e000.r-x.sdmpJoeSecurity_Mirai_9Yara detected MiraiJoe Security
        5734.1.00007f5c8c017000.00007f5c8c02e000.r-x.sdmpJoeSecurity_Mirai_5Yara detected MiraiJoe Security
          5734.1.00007f5c8c017000.00007f5c8c02e000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0x144a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x144b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x144c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x144dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x144f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x14504:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x14518:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1452c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x14540:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x14554:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x14568:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1457c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x14590:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x145a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x145b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x145cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x145e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x145f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x14608:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1461c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x14630:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          5734.1.00007f5c8c017000.00007f5c8c02e000.r-x.sdmpMirai_Botnet_MalwareDetects Mirai Botnet MalwareFlorian Roth
          • 0x1434c:$x1: POST /cdn-cgi/
          • 0x15854:$s1: LCOGQGPTGP
          5734.1.00007f5c8c017000.00007f5c8c02e000.r-x.sdmpMAL_ELF_LNX_Mirai_Oct10_2Detects ELF malware Mirai relatedFlorian Roth
          • 0x1434c:$c01: 50 4F 53 54 20 2F 63 64 6E 2D 63 67 69 2F 00 00 20 48 54 54 50 2F 31 2E 31 0D 0A 55 73 65 72 2D 41 67 65 6E 74 3A 20 00 0D 0A 48 6F 73 74 3A
          Click to see the 2 entries
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: loligang.arm6.elfAvira: detected
          Source: loligang.arm6.elfVirustotal: Detection: 61%Perma Link
          Source: loligang.arm6.elfReversingLabs: Detection: 73%
          Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com

          System Summary

          barindex
          Source: loligang.arm6.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: loligang.arm6.elf, type: SAMPLEMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
          Source: loligang.arm6.elf, type: SAMPLEMatched rule: Detects ELF malware Mirai related Author: Florian Roth
          Source: 5734.1.00007f5c8c017000.00007f5c8c02e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5734.1.00007f5c8c017000.00007f5c8c02e000.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
          Source: 5734.1.00007f5c8c017000.00007f5c8c02e000.r-x.sdmp, type: MEMORYMatched rule: Detects ELF malware Mirai related Author: Florian Roth
          Source: Process Memory Space: loligang.arm6.elf PID: 5734, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: ELF static info symbol of initial sample.symtab present: no
          Source: loligang.arm6.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: loligang.arm6.elf, type: SAMPLEMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
          Source: loligang.arm6.elf, type: SAMPLEMatched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
          Source: 5734.1.00007f5c8c017000.00007f5c8c02e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5734.1.00007f5c8c017000.00007f5c8c02e000.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
          Source: 5734.1.00007f5c8c017000.00007f5c8c02e000.r-x.sdmp, type: MEMORYMatched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
          Source: Process Memory Space: loligang.arm6.elf PID: 5734, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: classification engineClassification label: mal80.troj.linELF@0/0@2/0
          Source: /usr/lib/snapd/snap-failure (PID: 5826)Systemctl executable: /usr/bin/systemctl -> systemctl stop snapd.socketJump to behavior
          Source: /usr/lib/snapd/snap-failure (PID: 5809)Reads version info: /proc/versionJump to behavior
          Source: /tmp/loligang.arm6.elf (PID: 5734)Queries kernel information via 'uname': Jump to behavior
          Source: loligang.arm6.elf, 5734.1.000055fbb7144000.000055fbb7272000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
          Source: loligang.arm6.elf, 5734.1.000055fbb7144000.000055fbb7272000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
          Source: loligang.arm6.elf, 5734.1.00007ffe84283000.00007ffe842a4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
          Source: loligang.arm6.elf, 5734.1.00007ffe84283000.00007ffe842a4000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
          Source: loligang.arm6.elf, 5734.1.00007ffe84283000.00007ffe842a4000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/loligang.arm6.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/loligang.arm6.elf

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: loligang.arm6.elf, type: SAMPLE
          Source: Yara matchFile source: 5734.1.00007f5c8c017000.00007f5c8c02e000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: loligang.arm6.elf PID: 5734, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: loligang.arm6.elf, type: SAMPLE
          Source: Yara matchFile source: 5734.1.00007f5c8c017000.00007f5c8c02e000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: loligang.arm6.elf PID: 5734, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          Systemd Service
          1
          Systemd Service
          Direct Volume AccessOS Credential Dumping11
          Security Software Discovery
          Remote ServicesData from Local System1
          Non-Application Layer Protocol
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
          System Information Discovery
          Remote Desktop ProtocolData from Removable Media1
          Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          No configs have been found
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Number of created Files
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1583065 Sample: loligang.arm6.elf Startdate: 01/01/2025 Architecture: LINUX Score: 80 15 daisy.ubuntu.com 2->15 17 Malicious sample detected (through community Yara rule) 2->17 19 Antivirus / Scanner detection for submitted sample 2->19 21 Multi AV Scanner detection for submitted file 2->21 23 Yara detected Mirai 2->23 7 systemd snap-failure 2->7         started        9 loligang.arm6.elf 2->9         started        signatures3 process4 process5 11 snap-failure systemctl 7->11         started        13 snap-failure 7->13         started       
          SourceDetectionScannerLabelLink
          loligang.arm6.elf61%VirustotalBrowse
          loligang.arm6.elf74%ReversingLabsLinux.Backdoor.Mirai
          loligang.arm6.elf100%AviraLINUX/Mirai.bonb
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          daisy.ubuntu.com
          162.213.35.24
          truefalse
            high
            No contacted IP infos
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            daisy.ubuntu.comloligang.arm5.elfGet hashmaliciousMiraiBrowse
            • 162.213.35.24
            B_Y_T_E_x86.elfGet hashmaliciousMirai, OkiruBrowse
            • 162.213.35.25
            main_x86_64.elfGet hashmaliciousGafgyt, Mirai, OkiruBrowse
            • 162.213.35.25
            89.250.72.36-mips-2024-12-31T13_33_10.elfGet hashmaliciousGafgytBrowse
            • 162.213.35.24
            boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
            • 162.213.35.24
            boatnet.mips.elfGet hashmaliciousMiraiBrowse
            • 162.213.35.24
            boatnet.sh4.elfGet hashmaliciousMiraiBrowse
            • 162.213.35.24
            boatnet.spc.elfGet hashmaliciousMiraiBrowse
            • 162.213.35.25
            boatnet.arm6.elfGet hashmaliciousMiraiBrowse
            • 162.213.35.25
            Aqua.arm7.elfGet hashmaliciousMiraiBrowse
            • 162.213.35.25
            No context
            No context
            No context
            No created / dropped files found
            File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
            Entropy (8bit):6.1229054447720594
            TrID:
            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
            File name:loligang.arm6.elf
            File size:92'356 bytes
            MD5:113b69a75fef3c05400f2bb238517c71
            SHA1:44f89b451160b5cd00ec0dea58d797fc909b539e
            SHA256:48e34c5e31fc5a124a250fdf311177dacaaaaed7dc516b062976a7d4d8b7d2e5
            SHA512:7a1b6d58c5ae8db50dbeacb5b5768f17787f2813798a606ba7970179595feae0f9f46b24d372478a390f9862a115d3bc9d8101c2607d31304e679a472833f740
            SSDEEP:1536:iunCZPUrLwD7iCiAwFRO/9gc8kG6MwglRu9/J18WTL9mrsplDKZUEQBKXAVanFXh:IPkO7MA8RA9r8kGTw8Rc6WH9mrsplDKH
            TLSH:75931985B8419E25C6C5177BFA6F118E331247E8E2DAB213CD245B6477CA81F0E37A89
            File Content Preview:.ELF..............(.....T...4....f......4. ...(......................c...c...............c...c...c..................Q.td..................................-...L..................@-.,@...0....S..... 0....S.........../..0...0...@..../.pf.......c....-.@0....S

            ELF header

            Class:ELF32
            Data:2's complement, little endian
            Version:1 (current)
            Machine:ARM
            Version Number:0x1
            Type:EXEC (Executable file)
            OS/ABI:UNIX - System V
            ABI Version:0
            Entry Point Address:0x8154
            Flags:0x4000002
            ELF Header Size:52
            Program Header Offset:52
            Program Header Size:32
            Number of Program Headers:3
            Section Header Offset:91876
            Section Header Size:40
            Number of Section Headers:12
            Header String Table Index:11
            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
            NULL0x00x00x00x00x0000
            .initPROGBITS0x80940x940x100x00x6AX004
            .textPROGBITS0x80b00xb00x1428c0x00x6AX0016
            .finiPROGBITS0x1c33c0x1433c0x100x00x6AX004
            .rodataPROGBITS0x1c34c0x1434c0x204c0x00x2A004
            .init_arrayINIT_ARRAY0x2639c0x163a00x40x00x3WA004
            .fini_arrayFINI_ARRAY0x263a00x163a40x40x00x3WA004
            .gotPROGBITS0x263a80x163ac0x740x40x3WA004
            .dataPROGBITS0x2641c0x164200x2540x00x3WA004
            .bssNOBITS0x266700x166740x27ac0x00x3WA004
            .ARM.attributesARM_ATTRIBUTES0x00x166740x100x00x0001
            .shstrtabSTRTAB0x00x166840x5d0x00x0001
            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
            LOAD0x00x80000x80000x163980x163986.13950x5R E0x8000.init .text .fini .rodata
            LOAD0x1639c0x2639c0x263980x2d80xaa803.66150x6RW 0x8000.init_array .fini_array .got .data .bss
            GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
            TimestampSource PortDest PortSource IPDest IP
            Jan 1, 2025 18:05:50.470417976 CET3480053192.168.2.138.8.8.8
            Jan 1, 2025 18:05:50.475408077 CET53348008.8.8.8192.168.2.13
            Jan 1, 2025 18:05:50.475563049 CET3480053192.168.2.138.8.8.8
            Jan 1, 2025 18:05:50.475589991 CET3480053192.168.2.138.8.8.8
            Jan 1, 2025 18:05:50.475589991 CET3480053192.168.2.138.8.8.8
            Jan 1, 2025 18:05:50.480345011 CET53348008.8.8.8192.168.2.13
            Jan 1, 2025 18:05:50.480357885 CET53348008.8.8.8192.168.2.13
            Jan 1, 2025 18:05:50.927453995 CET53348008.8.8.8192.168.2.13
            Jan 1, 2025 18:05:50.927546978 CET3480053192.168.2.138.8.8.8
            Jan 1, 2025 18:05:51.056296110 CET53348008.8.8.8192.168.2.13
            Jan 1, 2025 18:05:51.056410074 CET3480053192.168.2.138.8.8.8
            Jan 1, 2025 18:05:52.927479982 CET53348008.8.8.8192.168.2.13
            Jan 1, 2025 18:05:52.927889109 CET3480053192.168.2.138.8.8.8
            Jan 1, 2025 18:05:52.932784081 CET53348008.8.8.8192.168.2.13
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Jan 1, 2025 18:05:50.475589991 CET192.168.2.138.8.8.80x7ed2Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
            Jan 1, 2025 18:05:50.475589991 CET192.168.2.138.8.8.80xffceStandard query (0)daisy.ubuntu.com28IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Jan 1, 2025 18:05:51.056296110 CET8.8.8.8192.168.2.130x7ed2No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
            Jan 1, 2025 18:05:51.056296110 CET8.8.8.8192.168.2.130x7ed2No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

            System Behavior

            Start time (UTC):17:05:48
            Start date (UTC):01/01/2025
            Path:/tmp/loligang.arm6.elf
            Arguments:/tmp/loligang.arm6.elf
            File size:4956856 bytes
            MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

            Start time (UTC):17:06:30
            Start date (UTC):01/01/2025
            Path:/usr/lib/systemd/systemd
            Arguments:-
            File size:1620224 bytes
            MD5 hash:9b2bec7092a40488108543f9334aab75

            Start time (UTC):17:06:30
            Start date (UTC):01/01/2025
            Path:/usr/lib/snapd/snap-failure
            Arguments:/usr/lib/snapd/snap-failure snapd
            File size:4764904 bytes
            MD5 hash:69136a7d575731ce62349f2e4d3e5c36

            Start time (UTC):17:06:30
            Start date (UTC):01/01/2025
            Path:/usr/lib/snapd/snap-failure
            Arguments:-
            File size:4764904 bytes
            MD5 hash:69136a7d575731ce62349f2e4d3e5c36

            Start time (UTC):17:06:30
            Start date (UTC):01/01/2025
            Path:/usr/bin/systemctl
            Arguments:systemctl stop snapd.socket
            File size:996584 bytes
            MD5 hash:4deddfb6741481f68aeac522cc26ff4b

            Start time (UTC):17:06:30
            Start date (UTC):01/01/2025
            Path:/usr/lib/snapd/snap-failure
            Arguments:-
            File size:4764904 bytes
            MD5 hash:69136a7d575731ce62349f2e4d3e5c36